Smbus Architecture and Implementation Overview

Total Page:16

File Type:pdf, Size:1020Kb

Smbus Architecture and Implementation Overview SMBus Architecture and Implementation Overview Robert A. Dunstan Mobile and Handheld Products Group - Mobile Technology Lab Intel Corporation [email protected] Abstract The SMBus was originally designed to add functionality, with a minimum impact on cost (pin count). A single SMBus in a system was envisioned to have sufficient bandwidth and flexibility to communicate with a variety of devices including batteries, LCD contrast and backlight controllers, power plane switches etc. As the SMBus and systems have matured, a different architecture is emerging. On the hardware front, new devices and uses for the bus are appearing, while multiple SMBus segments within a system are becoming common. SMBus host controllers are being adapted to meet these needs. A single SMBus host controller in the chipset has given way to multiple hosts ranging from a dedicated SMBus connecting a pair of devices to embedded controllers that support one or more SMBuses. At the system level, the Advanced Configuration and Power Interface (ACPI) defines standard methods that can be used to identify the SMBus(s) and devices on a given platform extending the operating system’s the ability to access and control these devices. ACPI will enable the operating system to coordinate its efforts to control the all system components, including those on the SMBus, resulting in better power management, longer battery life and reduced heat generation. with a Version 1.0 of each released early in History 1995. But was SMBus a done deal? SMBus (System Management Bus) was created As with many emerging technologies, the to extend chipset functionality without adding SMBus was incomplete. Not the specification more pins. Intel’s Mobile and Handheld itself, but rather the environment. How was Products Group (MHPG) found that while more data going to get from the SMBus to the system? functionality could be added to the chipset, the To meet the need, the SMBus BIOS spec was packaging only had a limited the number of pins published. Use of the BIOS allowed system available for these new functions. MHPG designers to hide the details of the actual SMBus engineers looking for a solution, identified low- implementation from the system software. At a speed serial buses as a way to extend the higher level, there was a need to access the functionality of their chipsets. At the same SMBus devices from the operating system. Intel time, another group within MHPG was created and made available a set of reference investigating intelligent batteries and needed a drivers that worked in both Windows 3.1 and simple, inexpensive means to attach the battery Windows 95. These drivers allowed to the system. These efforts were combined to applications to access SMBus devices, and in define SMBus, based on the existing I2C serial particular provided access to the Smart Battery. bus. I2C’s addressing, start/stop and collision detection/correction were adopted unchanged, but the electrical characteristics were tailored to Implementations meet the special needs of batteries and a well The first commercially available SMBus devices defined set of higher level protocols was added. were Smart Batteries targeted at the notebook The drafts of the SMBus and Smart Battery Data market. They appeared in commercial specifications were first published early in 1994, quantities early in 1995 with notebooks using them and SMBus BIOSes following later in 1995. However, there were challenges facing the bus to send messages to the charger or to the the early adopters of SMBus, notably the host. absence of an SMBus host controller chip or a Master only hosts today, take more care in their component with an SMBus UART. These first handling of the bus. They observe bus timing implementations used the keyboard controller to requirements so as not to cause SMBus devices emulate the SMBus host. on the bus to time out. They do not try to master The early systems using the keyboard controller the bus when a transaction is in progress. Many to emulate the SMBus host typically supported a periodically reset the bus and/or whenever they single SMBus device, the Smart Battery. The detect an unexpected bus state. These SMBus host often ignored the fact that the improvements have resulted in more reliable Smart Battery mastered the SMBus to issue SMBus hosts. alarms and simply depended on the battery’s Systems today usually support at least two ability to survive until the SMBus host batteries and a Smart Charger. This adds discovered that the battery was in an alarm additional requirements to the SMBus host. condition. Ignoring the state of the bus when Hosts that are master only must be able to deal the host initiated a bus transaction could cause with multiple masters on the bus. the battery to suffer a temporary communications failure. It also required the Along with the trend towards multiple batteries host to poll on the SMBus to determine if any is the addition of multiple SMBuses in a system. device was in an alarm condition. These Systems with multiple Smart Batteries require systems could not take advantage of the SMBus independent SMBus segments to allow Alert mechanism, which allows a device to independent access and charger coherency. To assert an alert line that notifies the host of an ensure safe operation, the SMBus between the alarm condition because the Smart Battery does Smart Battery Charger and the Smart Battery it not use this feature. is charging must be maintained at all times. Failure to do this can result in spectacular SMBus Host battery failures. But while maintaining a tight Master only connection between the battery and the charger, (part of KBC) the host needs to have the capability to read information from all Smart Batteries in the system. To do this, an additional battery system component, the Smart Battery Selector, has been SMBus developed. SMBus Host Other SMBus Smart Battery Device(s) Smart Battery Other SMBus Smart Battery #1 Smart Battery #2 Selector Device(s) Figure 1. Many of the early SMBus host emulations failed Smart Battery to observe good SMBus etiquette and simply Charger started writing on the SMBus without checking to see if it was busy. This could cause other Figure 2 SMBus devices to become confused. As these Multiple SMBus segments have appeared in were incomplete implementations of the SMBus another context. Private SMBus segments specification, they often exhibited other between pairs of tightly coupled components are unpredictable behaviors. For example, many being used. One example is a CardBus had difficulty when the Smart Battery was controller and a switch that controls the voltage inserted or removed, particularly during a supplied to the CardBus slot. The system transaction or when the Smart Battery mastered communicates to the CardBus controller in the can be included with the operating system as typical fashion using IO ports. The CardBus well. controller accepts commands to control the This example embedded controller also replaces voltage at its slot and then translates them into the functionality of two Smart Battery system SMBus commands that go to the voltage components, the charger and the selector. At selection switch via a private SMBus segment. the interface, it looks like all the components are If the system was required to communicate on the SMBus, but the actual implementation is directly with the voltage selection switch, it quite different, taking advantage of embedded would require at least a read/write line, eight controller to replace functional blocks reducing data lines and a chip select instead of the component count and real estate. The example SMBus’s clock and data line. Using a private embedded controller emulates two SMBus SMBus segment saves a relatively large number segments to individually communicate with two of pins that can result in a considerable cost Smart Batteries. It either operates in a saving. master/slave mode or master only where it must Systems in the future will probably have poll the batteries for alarm conditions. When an multiple SMBuses, multiple SMBus hosts and alarm is detected or there is a status change in private SMBus segments. Figure 3 below is a the Smart Battery system, the embedded block diagram of such a system. controller issues an SCI (ACPI style event notification) which causes the operating system Embedded Controller to identify issuer and service the interrupt. Interface (ACPI) In this example, the embedded controller may Smart Battery #1 Embedded Smart Battery #2 serve another purpose as well. There are some Controller (Smart Battery devices that should not be fully exposed. For Selector, Smart Battery Charger) example, a rogue piece of code could continually force the Smart Charger on the SMBus to charge the battery, potentially causing a battery Card Bus SMBus Host failure or could command the SMBus power Controller plane controller to turn off the main power plane. These SMBus devices can be “hidden” behind the embedded controller interface, available to the system, but totally inaccessible Card Bus Power Switch at the SMBus interface. The embedded controller can reject or ignore requests in order SMBus Device #1 SMBus Device #2 to maintain system safety and integrity. It should be noted that the embedded controller Figure 3 may perform many other system activities as well. This system shows three different collections of SMBus components. The upper is of particular The lower left of Figure 3 represents a chipset interest as an example of an embedded with a SMBus UART. In this case the SMBus controller whose interface is reported to the host is a simple UART and is limited to operating system via ACPI. The key features communicating with devices on the SMBus. are: The lower right of Figure 3 represents a pair of · ACPI reports the location of the embedded devices that use an SMBus segment to pass controller register set.
Recommended publications
  • Coreboot - the Free Firmware
    coreboot - the free firmware vimacs <https://vimacs.lcpu.club> Linux Club of Peking University May 19th, 2018 . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 1 / 77 License This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. You can find the source code of this presentation at: https://git.wehack.space/coreboot-talk/ . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 2 / 77 Index 1 What is coreboot? History Why use coreboot 2 How coreboot works 3 Building and using coreboot Building Flashing 4 Utilities and Debugging 5 Join the community . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 3 / 77 Index 6 Porting coreboot with autoport ASRock B75 Pro3-M Sandy/Ivy Bridge HP Elitebooks Dell Latitude E6230 7 References . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 4 / 77 1 What is coreboot? History Why use coreboot 2 How coreboot works 3 Building and using coreboot Building Flashing 4 Utilities and Debugging 5 Join the community . vimacs (LCPU) coreboot - the free firmware May 19th, 2018 5 / 77 What is coreboot? coreboot is an extended firmware platform that delivers a lightning fast and secure boot experience on modern computers and embedded systems. As an Open Source project it provides auditability and maximum control over technology. The word ’coreboot’ should always be written in lowercase, even at the start of a sentence. vimacs (LCPU) coreboot - the free firmware May 19th, 2018 6 / 77 History: from LinuxBIOS to coreboot coreboot has a very long history, stretching back more than 18 years to when it was known as LinuxBIOS.
    [Show full text]
  • A MICROCHIP TECHNOLOGY INC. PUBLICATION Intruder Proof
    A MICROCHIP TECHNOLOGY INC. PUBLICATION SEPT/OCT 2015 Intruder Proof Driving the 8-bit Bidirectional 6 19 MCU Evolution 27 IoT A MICROCHIP TECHNOLOGY INC. PUBLICATION SEPT/OCT 2015 COVER STORY NEW TOOLS Driving the 8-bit MCU Evolution 4 Satisfy Your Curiosity 19 New Development Board Provides Cost-Effective and Fully Integrated Entry into Designing with Microchip’s 8-bit PIC® Microcontrollers TECHNOLOGY 21 MOST® Technology in the News NEW PRODUCTS 6 Intruder Proof Latest Family of eXtreme Low Power PIC Microcontrollers DESIGN CORNER Offers Double the Flash Memory and New Security Options 23 Tired of Embedded Design Bottlenecks? 8 More to Love New Additions to Popular PIC32MX and PIC32MZ 25 Overcoming a Noisy World Families Offer Wide Variety of Features for Designers of Next-Generation Embedded Systems 27 Bidirectional IoT 10 A Connector Revolution 29 Blast Off! Cost-Effective UTC2000 Supports Radically Updated USB-C™ Connector 32 Defying the Odds 11 Seamless Migration New Family of Highly Configurable, Low-Power Embedded DEV TOOL DEALS Controllers Allows Mobile Computing Designers to Easily A Harvest of Savings Reuse IP Across Multiple x86 Platforms 22 13 Advanced Industrial Connectivity Enhanced Industrial Ethernet Switches Feature IEEE 1588-2008 Precision Time Protocol and Low-Power Options Is it Hot in Here? 15 contents Save Design Effort, Space and Cost with the New MCP9600 Integrated Thermocouple to Degrees Celsius Converter 17 Simple Solution Industry’s First MOST150 Coaxial Transceiver Enables Powerful, Robust and Cost-Efficient Automotive Infotainment Networks The Microchip name and logo, the Microchip logo, dsPIC, FlashFlex, KEELOQ, KEELOQ logo, MOST, MPLAB, mTouch, PIC, PICmicro, PICSTART, PIC32 logo, rfPIC, SST, SST Logo, SuperFlash and UNI/O are registered trademarks of Microchip Technology Incorporated in the U.S.A.
    [Show full text]
  • System Management Bus(Smbus)Specification
    System Management Bus (SMBus) Specification Version 3.1 19 Mar 2018 www.powerSIG.org © 2018 System Management Interface Forum, Inc. – All Rights Reserved Filename: SMBus 3_1_20180319.docx Last Saved: 19 March 2018 09:31 System Management Bus (SMBus) Specification Version 3.1 This specification is provided “as is” with no warranties whatsoever, whether express, implied or statutory, including but not limited to any warranty of merchantability, non-infringement or fitness for any particular purpose, or any warranty otherwise arising out of any proposal, specification or sample. In no event will any specification co-owner be liable to any other party for any loss of profits, loss of use, incidental, consequential, indirect or special damages arising out of this specification, whether or not such party had advance notice of the possibility of such damages. Further, no warranty or representation is made or implied relative to freedom from infringement of any third party patents when practicing the specification. Other product and corporate names may be trademarks of other companies and are used only for explanation and to the owner’s benefit, without intent to infringe. Revision No. Date Notes Editor 1.0 15 Feb 1995 General Release Robert Dunstan 1.1 11 Dec 1998 Version 1.1 Release Robert Dunstan 2.0 3 Aug 2000 Version 2.0 Release Robert Dunstan 3.0 20 Dec 2014 Version 3.0 Release Robert V. White Embedded Power Labs 3.1 19 Mar 2018 Version 3.1 Release Robert V. White Embedded Power Labs Questions and comments regarding this For additional information on Smart Battery System specification may be forwarded to: Specifications, visit the SBS Implementer’s Forum [email protected] (SBS-IF) at: www.sbs-forum.org © 2018 System Management Interface Forum, Inc.
    [Show full text]
  • Dell Trusted Device Below the OS Whitepaper
    Client Solutions Dell Trusted Device: BIOS Security An introduction to the Dell Trusted Device BIOS and security features. Author: Rick Martinez © 2020 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. Initial Release – September 2020 Table of Contents Executive summary 3 The Key Elements of Dell BIOS Security 4 What is BIOS? What is UEFI? . 4 The Importance of “Below the OS” Security . 5 NIST Cybersecurity Framework . 6 Identify 6 Identity and Asset Management Tags . 6 SDL 7 Secure Design Processes and SDL . 8 Industry Affiliations . .8 “Below the OS” Threat Modeling . 8 Protect 9 The PC Boot Process . 9 UEFI Secure Boot Expert Mode . 11 Signed Firmware Update. .11 NIST SP800-147 Support . 12 Mitigating SMM Threats with Intel BIOS Guard . 12 What is SMM? . 12 Mitigation: Intel BIOS Guard . 13 BIOS Patch Management . 13 BIOS Downgrade Protection . 14 Embedded Controller: Signed Firmware . 14 Protecting BIOS Configuration. 14 Protecting BIOS at Runtime . 17 Detect 19 Intel Boot Guard . 19 SafeBIOS Verification . 20 BIOS Indicators of Attack . 21 Chassis Intrusion . 22 TCG Measured Boot . 22 Recover 24 Embedded Controller Recovery . 24 BIOS Recovery . 24 Dell Data Wipe . 26 Supply Chain Assurance 27 Protected Signing Infrastructure. 27 The Future of Security 28 Appendix 29 Referenced Links. 29 Learn More 30 Acknowledgements . 30 About the author. 30 Executive summary Computer security is a multi-billion dollar business with thousands of companies competing for organizations’ attention and enterprise dollars. Dell Technologies has created an innovative and effective portfolio of technologies and solutions in this industry to help organizations secure their enterprises.
    [Show full text]
  • Dspic® Digital Signal Controllers
    dsPIC® Digital Signal Controllers dsPIC® Digital Signal Controllers www.microchip.com/DSC Digital Signal Controller Solutions Building on the legacy of Microchip’s world-leading 8-bit PIC® microcontrollers, 16-bit dsPIC® Digital Signal Controllers (DSCs) deliver a large product portfolio to make your demanding applications more competitive by providing lower system cost and improved effi ciency. A Digital Signal Controller (DSC) is a single-chip embedded controller that seamlessly integrates the control attributes of a microcontroller (MCU) with the computation and throughput capabilities of a Digital Signal Processor (DSP). Reduce Development Risk Save System Cost Natural step up for 8-bit MCU users needing more Simplify your design through integration performance/memory and effi ciency ■ Industry’s largest DSC portfolio for optimal product fi t ■ Best in class ‘C’ effi ciency enables reduced Flash size ■ Extensive software and application design support ■ Low pin count packages provide lower product cost ■ Same Integrated Development Environment for ■ Replace complex analog fi lters with digital fi lters 8/16/32-bit MCUs ■ Highly Integrated DSCs reduce external components ■ Extensive web seminars and training courses Discover New Design Options Complete Project on Schedule Transform ideas into reality Leverage existing software, unprecedented ■ Add powerful features with DSC capabilities compatibility and powerful graphical tools ■ Employ advanced algorithms to improve effi ciency ■ Free software, code examples and peripheral libraries ■ Explore
    [Show full text]
  • Intel® Chipsets Low Pin Count Interface Specification
    R Intel® Low Pin Count (LPC) Interface Specification August 2002 Revision 1.1 Document Number: 251289-001 Introduction R Information in this document is provided in connection with Intel® products.No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document.Except as provided in Intel’s Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. THIS SPECIFICATION IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NON-INFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE.Intel disclaims all liability, including liability for infringement of any proprietary rights, relating to use of informa tion in this specification.No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein, except that a li cense is hereby granted to copy and reproduce this specification for internal use only.
    [Show full text]
  • Reduce Firmware Booting Time in Multi-Threaded Environment
    Open Source Firmware Development Reduce Firmware Booting Time Using Multi- Threaded Environment White Paper Revision 001 January 2019 Document Number: 338658-001 You may not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning Intel products described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter drafted which includes subject matter disclosed herein. No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document. Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Learn more at Intel.com, or from the OEM or retailer. No computer system can be absolutely secure. Intel does not assume any liability for lost or stolen data or systems or any damages resulting from such losses. The products described may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Intel disclaims all express and implied warranties, including without limitation, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement, as well as any warranty arising from course of performance, course of dealing, or usage in trade. Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Learn more at intel.com, or from the OEM or retailer. All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel product specifications and roadmaps.
    [Show full text]
  • M9536A Axie Embedded Controller
    Startup Guide Keysight M9536A AXIe Embedded Controller Notices © Keysight Technologies, Inc. 2011 - Sales and Technical Support Warranty 2014 To contact Keysight for sales and techni- THE MATERIAL CONTAINED IN THIS No part of this manual may be repro- cal support, refer to the support links on DOCUMENT IS PROVIDED “AS IS,” AND duced in any form or by any means the following Keysight websites: IS SUBJECT TO BEING CHANGED, (including electronic storage and retrieval WITHOUT NOTICE, IN FUTURE EDI- or translation into a foreign language) www.keysight.com/find/9536A (product- TIONS. FURTHER, TO THE MAXIMUM without prior agreement and written con- specific information and support, soft- EXTENT PERMITTED BY APPLICABLE sent from Keysight Technologies, Inc. as ware and documentation updates) LAW, KEYSIGHT DISCLAIMS ALL WAR- governed by United States and interna- RANTIES, EITHER EXPRESS OR IMPLIED, tional copyright laws. www.keysight.com/find/assist (world- wide contact information for repair and WITH REGARD TO THIS MANUAL AND service) ANY INFORMATION CONTAINED Manual Part Number HEREIN, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MER- M9536-90001 Declaration of Conformity CHANTABILITY AND FITNESS FOR A Declarations of Conformity for this prod- PARTICULAR PURPOSE. KEYSIGHT Edition uct and for other Keysight products may SHALL NOT BE LIABLE FOR ERRORS OR be downloaded from the Web. Go to FOR INCIDENTAL OR CONSEQUENTIAL Seventh Edition, December 2014 http://keysight.com/go/conformity and DAMAGES IN CONNECTION WITH THE Printed in Malaysia click on “Declarations of Conformity.” You FURNISHING, USE, OR PERFORMANCE can then search by product number to OF THIS DOCUMENT OR OF ANY INFOR- find the latest Declaration of Conformity.
    [Show full text]
  • UNIT-I - OVERVIEW of EMBEDDED SYSTEMS Embedded System
    UNIT-I - OVERVIEW OF EMBEDDED SYSTEMS Embedded System . An embedded system can be thought of as a computer hardware system having software embedded in it. An embedded system can be an independent system or it can be a part of a large system. An embedded system is a microcontroller or microprocessor based system which is designed to perform a specific task. For example, a fire alarm is an embedded system; it will sense only smoke. An embedded system has three components − It has hardware. It has application software. It has Real Time Operating system (RTOS) that supervises the application software and provide mechanism to let the processor run a process as per scheduling by following a plan to control the latencies. RTOS defines the way the system works. It sets the rules during the execution of application program. A small scale embedded system may not have RTOS. So we can define an embedded system as a Microcontroller based, software driven, reliable, real-time control system. Characteristics of an Embedded System Single-functioned − An embedded system usually performs a specialized operation and does the same repeatedly. For example: A pager always functions as a pager. Tightly constrained − All computing systems have constraints on design metrics, but those on an embedded system can be especially tight. Design metrics is a measure of an implementation's features such as its cost, size, power, and performance. It must be of a size to fit on a single chip, must perform fast enough to process data in real time and consume minimum power to extend battery life.
    [Show full text]
  • SMBIOS) Reference 6 Specification
    1 2 Document Identifier: DSP0134 3 Date: 2018-04-26 4 Version: 3.2.0 5 System Management BIOS (SMBIOS) Reference 6 Specification 7 Supersedes: 3.1.1 8 Document Class: Normative 9 Document Status: Published 10 Document Language: en-US 11 System Management BIOS (SMBIOS) Reference Specification DSP0134 12 Copyright Notice 13 Copyright © 2000, 2002, 2004–2016 Distributed Management Task Force, Inc. (DMTF). All rights 14 reserved. 15 DMTF is a not-for-profit association of industry members dedicated to promoting enterprise and systems 16 management and interoperability. Members and non-members may reproduce DMTF specifications and 17 documents, provided that correct attribution is given. As DMTF specifications may be revised from time to 18 time, the particular version and release date should always be noted. 19 Implementation of certain elements of this standard or proposed standard may be subject to third party 20 patent rights, including provisional patent rights (herein "patent rights"). DMTF makes no representations 21 to users of the standard as to the existence of such rights, and is not responsible to recognize, disclose, 22 or identify any or all such third party patent right, owners or claimants, nor for any incomplete or 23 inaccurate identification or disclosure of such rights, owners or claimants. DMTF shall have no liability to 24 any party, in any manner or circumstance, under any legal theory whatsoever, for failure to recognize, 25 disclose, or identify any such third party patent rights, or for such party’s reliance on the standard or 26 incorporation thereof in its product, protocols or testing procedures.
    [Show full text]
  • SBC35-427 Supplemental BIOS Manual
    SBC35-427 Supplemental BIOS Manual WinSystems, Inc. | 715 Stadium Drive, Arlington, Texas 76011 | 817-274-7553 | [email protected] | www.winsystems.com SBC35-427 Revision History Last Updated BIOS Version Brief Description of Change Date 42719177 1/1/19 Initial release Copyright and Trademarks Copyright 2019, WINSYSTEMS, Inc. No part of this document may be copied or reproduced in any form or by any means without the prior written consent of WINSYSTEMS, Inc. The information in the document is subject to change without notice. The information furnished by WINSYSTEMS, Inc. in this publication is believed to be accurate and reliable. However, WINSYSTEMS, Inc. makes no warranty, express, statutory, implied or by description, regarding the information set forth herein or regarding the freedom of the described devices from patent infringement. WINSYSTEMS, Inc. makes no warranty of merchantability or fitness for any purpose. WINSYSTEMS, Inc. assumes no responsibility for any errors that may appear in this document. Trademark Acknowledgments WINSYSTEMS is a registered trademark of WINSYSTEMS, Inc. Intel and Intel Atom are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. All other marks are the property of their respective companies. v1.0 www.winsystems.com Page 2 SBC35-427 1 Introduction . 5 1.1 References . .5 1.2 Glossary. .5 2 BIOS Update with UEFI Shell . 5 2.1 Scope . .5 2.2 Process . .6 3 Embedded Controller (EC) Update with UEFI Shell. 7 3.1 Process . .7 4 BIOS Settings . 8 4.1 Entering the BIOS . .8 4.2 Main . .8 4.3 Configuration .
    [Show full text]
  • Imm Tps 12.Pdf
    Intel® Management Module Technical Product Specification Revision 1.1 October, 2006 Enterprise Platforms and Services Division - Marketing Revision History Intel® Management Module Revision History Date Revision Modifications Number March 2005 0.7 Initial release. April 2005 0.9 Preliminary draft release June 2005 1.0 Released version October 2006 1.1 Updated Section 5.6, SNMP Disclaimers Information in this document is provided in connection with Intel® products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. This document contains information on products in the design phase of development. Do not finalize a design with this information. Revised information will be published when the product is available. Verify with your local sales office that you have the latest datasheet before finalizing a design.
    [Show full text]